Threat Database Adware Adware.MediaMagnet

Adware.MediaMagnet

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 7,912
Threat Level: 20 % (Normal)
Infected Computers: 44,691
First Seen: September 8, 2014
Last Seen: October 24, 2025
OS(es) Affected: Windows

SpyHunter Detects & Remove Adware.MediaMagnet

File System Details

Adware.MediaMagnet may create the following file(s):
# File Name MD5 Detections
1. extinst.exe c5fb573a430182d14de6b77a1971c32c 2,858
2. prof2you.exe 94c27555a7febaf5e958960015b62b7d 281
3. s_inst.exe 383dfd71a4053c256685ff8624a200c6 25
4. uninstall.exe 832a0107df5df2d73bfe4fe8c62a6fb8 17
More files

Registry Details

Adware.MediaMagnet may create the following registry entry or registry entries:
Regexp file mask
%APPDATA%\prof2you.exe

Directories

Adware.MediaMagnet may create the following directory or directories:

%LOCALAPPDATA%\7774633137_2547
%LOCALAPPDATA%\MzIzNTM0Mzc=
%appdata%\mydesktop

Analysis Report

General information

Family Name: Adware.MediaMagnet
Signature status: No Signature

Known Samples

MD5: 386f03bbe66224751e0b5854e38b2862
SHA1: a4f07dcf9718fd93071b1870a662697ac7fc6208
SHA256: 72AED40CC6B8F3D916FE0CD81CEAB74333E827DC9BCC758A529107B3A615A960
File Size: 622.51 KB, 622507 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name DirbySofr, Inc.
File Description application extension Setup
Product Name application extension
Product Version 1.5

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-ja7lr.tmp\a4f07dcf9718fd93071b1870a662697ac7fc6208_0000622507.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Omaiqddk\AppData\Local\Temp\is-JA7LR.tmp\a4f07dcf9718fd93071b1870a662697ac7fc6208_0000622507.tmp" /SL5="$60206,369678,56832,c:\users\user\downloads\a4f07dcf9718fd93071b1870a662697ac7fc6208_0000622507"

Trending

Most Viewed

Loading...